Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threat-based Operational Security Approach

公司规模
Large Corporate
地区
- Asia
国家
- Philippines
产品
- Falcon Complete
- Falcon Prevent NGAV
- Falcon Insight EDR
- Falcon OverWatch
- Falcon Discover IT Hygiene
技术栈
- CrowdStrike Falcon Platform
- CrowdScore
实施规模
- Enterprise-wide Deployment
影响指标
- Customer Satisfaction
- Digital Expertise
- Productivity Improvements
技术
- 网络安全和隐私 - 应用安全
- 网络安全和隐私 - 网络安全
- 网络安全和隐私 - 安全合规
适用行业
- 电信
适用功能
- 商业运营
用例
- 网络安全
- 入侵检测系统
- 远程资产管理
服务
- 网络安全服务
- 系统集成
关于客户
Globe Telecom is the leading telecommunications provider in the Philippines, serving over 80 million customers, which accounts for roughly three-quarters of the country's population. As a major player in the telecommunications industry, Globe Telecom has a significant responsibility to ensure the security and reliability of its services. The company has been proactive in transforming its cybersecurity approach to better protect its vast customer base and its own infrastructure. Globe Telecom's leadership recognized the need to shift from a traditional risk-, compliance-, and audit-based model to a more dynamic threat-based model. This shift was driven by the increasing sophistication of cyber threats and the need for a more agile and responsive security posture. To achieve this, Globe Telecom established a security operations center (SOC), consolidated departments, and significantly expanded its IT team, increasing its size by over 300%. The company also increased its capital expenditure on IT and security to build a robust foundation for its cybersecurity efforts.
挑战
Despite a conservative approach to cybersecurity investment, the Asia-Pacific region, including Globe Telecom, faces the same cyberthreats as elsewhere, particularly the growing concern of ransomware. The region's conservative approach has led to a talent gap, making it difficult to identify and recruit threat hunters and experienced analysts. Telecom is one of the industries most commonly targeted by sophisticated adversaries, and Globe Telecom required cutting-edge cybersecurity to protect both its internal systems and infrastructure and its customers from the latest threats. Additionally, Globe Telecom sought to adopt a new approach to security for full visibility to better manage response, resources, and compliance.
解决方案
Globe Telecom chose CrowdStrike as its security partner in 2016, deploying the CrowdStrike Falcon platform. The deployment was completed quickly, with phase one initially within a day, and the total deployment time was 90% less than that of their previous solution. Globe Telecom engaged with the CrowdStrike Falcon OverWatch team of threat hunting experts, gaining immediate visibility into its 17,400 endpoints and threats they were previously unaware of. The CrowdStrike CrowdScore capability helped prioritize incident response, allowing Globe Telecom to focus on the most critical threats. The Falcon OverWatch team became a trusted extension of Globe Telecom's security operations team, helping them identify and understand sophisticated threats and move to higher levels of cybersecurity maturity. This partnership enabled Globe Telecom to communicate cybersecurity progress and concerns clearly to executive leadership, facilitating effective decision-making.
运营影响
数量效益
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.

Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.

Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.